Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 01:23

General

  • Target

    04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe

  • Size

    96KB

  • MD5

    bf9bfca84a7bb3311b3c9d893a50b522

  • SHA1

    84d36f7a74e3742dc9b7741e2483816e90ccfcc6

  • SHA256

    04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6

  • SHA512

    2f91186bb708616eb312991dc2a06ba45eaadba61794dd7c3320a1a356b1d615665b4e75c6278854d0d7bb96836dfdd94aa332c9e07099542011aa5f465f95f9

  • SSDEEP

    1536:LfgLdQAQfcfymNBawjmDNTjSvhr/vy7H5qqqqqgapEd8s3:LftffjmNBaxp0rSkpEd7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe
        "C:\Users\Admin\AppData\Local\Temp\04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aCB4F.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Users\Admin\AppData\Local\Temp\04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe
            "C:\Users\Admin\AppData\Local\Temp\04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe"
            4⤵
            • Executes dropped EXE
            PID:932
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3464
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:4024

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7z.exe

        Filesize

        570KB

        MD5

        97d5447954f2eb0df588787b6ecb252c

        SHA1

        b6a7cb5457e064d4bccfc837e20d82d89e5a2cf4

        SHA256

        edad72416ffa909db11d7d6cfe30b2e56be62772319de63a1bfbf8986dca8753

        SHA512

        08e69f4ca2d5f8bced53e0f79784274fa079d3357e217eef71bdbe50adf4c978ce5a279032f9579b085620d6a4cba0516e495d81c3d3140b389a6240a359e2be

      • C:\Users\Admin\AppData\Local\Temp\$$aCB4F.bat

        Filesize

        722B

        MD5

        1bdd9b5bf4305f566a86c03d1f43bbed

        SHA1

        2700929ca5ce33ebc30adcd49b99743764a4f3ea

        SHA256

        9251d1152c01375c2872fa8f47fb29df8f67854421c4863bfd9daf94d9313997

        SHA512

        42963c80fde635417743f0bea31ea999f9e609645182b68a4b608fc0663810879a219fa7eebeeb167b644a9bafa320c03115dae138c42ed5574bf676c08fcd2c

      • C:\Users\Admin\AppData\Local\Temp\04e037173602a9538735bae966badfe5384d6e06860b737ae055e0e5b69d10c6.exe.exe

        Filesize

        69KB

        MD5

        b54edf5cd1cd3698d1f9b43d30efa678

        SHA1

        e5551b886cad5c445c7e2e38014725cf98bcf7ac

        SHA256

        74d6afbca51944638bdfee995f2244772fe14781d6f99d25649482415b8194a5

        SHA512

        9f5bb9ddca611c52686240a24f0ffe80d5302c834a46ec2870e6d98d58bb1da047876070c3e64fe4dee9fa500f3f7707dcac641cf7c463812be49cfebb655460

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        1eb297a4f27e72b32ffbc165a5a66c1b

        SHA1

        c432d9ad68b7cb178aefc5e49db2ea9006d4bc6b

        SHA256

        8fcb9444ee983ee6da9b67e4ee0e7ee98edab51eb18b02595ddb63322102a974

        SHA512

        ce1b82829b31985c41d16d6b5125cc6c4367f42eaaaa74cd24e20f7ea076c19c141ab03a6cd73b2c64888e58b1e8346e32deab1c8b44e8d5b00fd401d45b2a7c

      • F:\$RECYCLE.BIN\S-1-5-21-776854024-226333264-2052258302-1000\_desktop.ini

        Filesize

        9B

        MD5

        72b7e38c6ba037d117f32b55c07b1a9c

        SHA1

        35e2435e512e17ca2be885e17d75913f06b90361

        SHA256

        e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6

        SHA512

        2bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a

      • memory/2388-12-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2388-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2388-1-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-10-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-28-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-39-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-58-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-578-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3464-1231-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB